2012 IEEE International Conference on Green Computing and Communications最新文献

筛选
英文 中文
EventRadar: A Real-Time Local Event Detection Scheme Using Twitter Stream EventRadar:一个使用Twitter流的实时本地事件检测方案
2012 IEEE International Conference on Green Computing and Communications Pub Date : 2012-11-20 DOI: 10.1109/GreenCom.2012.59
Alexander Boettcher, Dongman Lee
{"title":"EventRadar: A Real-Time Local Event Detection Scheme Using Twitter Stream","authors":"Alexander Boettcher, Dongman Lee","doi":"10.1109/GreenCom.2012.59","DOIUrl":"https://doi.org/10.1109/GreenCom.2012.59","url":null,"abstract":"Twitter has become popular among researchers as a means to detect various kinds of events. Several attempts were made to detect trends, real world events, news, earthquakes and others with satisfying results. However they do not perform well on finding local events such as release parties, musicians in a park, or art exhibitions. Many of the local events that were found by algorithms of existing work were not related to an event but to locations, global events, or just common words. In this paper, we introduce Event Radar, a novel local event detection method to improve the precision by analyzing seven day historic Tweet data. We estimate the average Tweet frequency of keywords per day in and around a potential event area and use these estimations to classify whether the keywords are related to a local event. The proposed scheme achieves a precision rate of 68% which is a significant improvement compared to related work that states a precision rate of 25.5%.","PeriodicalId":148667,"journal":{"name":"2012 IEEE International Conference on Green Computing and Communications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128220919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
A Distributed Simulation Platform for Urban Security 城市安防分布式仿真平台
2012 IEEE International Conference on Green Computing and Communications Pub Date : 2012-11-20 DOI: 10.1109/GREENCOM.2012.68
A. Filippoupolitis, E. Gelenbe
{"title":"A Distributed Simulation Platform for Urban Security","authors":"A. Filippoupolitis, E. Gelenbe","doi":"10.1109/GREENCOM.2012.68","DOIUrl":"https://doi.org/10.1109/GREENCOM.2012.68","url":null,"abstract":"Effectively responding to a security incident that takes place inside a city, whether that is a routine road accident or a terrorist attack, is a complex and challenging task. Security forces and administrative bodies have to cooperate in order to share information, allocate resources and create the optimal response. In this paper we present a distributed simulation framework for studying security operations which take place inside an urban environment. More specifically, we model a cyber-physical system that aims at engaging malicious entities present inside a city. Our model includes the physical urban area, the participating actors and the information exchange among the participants. This design allows the evaluation of the effect of different communication patterns on the outcome of an operation. Finally, our platform allows us to investigate realistic scenarios with multiple participating actors and also gives us the opportunity to evaluate how different actor roles and responsibilities affect the overall operation outcome.","PeriodicalId":148667,"journal":{"name":"2012 IEEE International Conference on Green Computing and Communications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129779175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Common Framework for Attack Modeling and Security Evaluation in SIEM Systems SIEM系统攻击建模与安全评估通用框架
2012 IEEE International Conference on Green Computing and Communications Pub Date : 2012-11-20 DOI: 10.1109/GreenCom.2012.24
Igor Kotenko, A. Chechulin
{"title":"Common Framework for Attack Modeling and Security Evaluation in SIEM Systems","authors":"Igor Kotenko, A. Chechulin","doi":"10.1109/GreenCom.2012.24","DOIUrl":"https://doi.org/10.1109/GreenCom.2012.24","url":null,"abstract":"The paper suggests a framework for attack modeling and security evaluation in Security Information and Event Management (SIEM) systems. It is supposed that the common approach to attack modeling and security evaluation is based on modeling of a malefactor's behavior, generating a common attack graph, calculating different security metrics and providing risk analysis procedures. Key elements of suggested architectural solutions for attack modeling and security evaluation are using a comprehensive security repository, effective attack graph (tree) generation techniques, taking into account known and new attacks based on zero-day vulnerabilities, stochastic analytical modeling, and interactive decision support to choose preferred security solutions. The architecture of the Attack Modeling and Security Evaluation Component (AMSEC) is proposed, its interaction with other SIEM components is described. We present the prototype of the component and the results of experiments carried out.","PeriodicalId":148667,"journal":{"name":"2012 IEEE International Conference on Green Computing and Communications","volume":"18 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Connecting People at a Conference: A Study of Influence between Offline and Online Using a Mobile Social Application 在会议上连接人们:使用移动社交应用程序研究离线和在线之间的影响
2012 IEEE International Conference on Green Computing and Communications Pub Date : 2012-11-20 DOI: 10.1109/GreenCom.2012.52
Xiang Zuo, Alvin Chin, Xiaoguang Fan, Bin Xu, Dezhi Hong, Y. Wang, Xia Wang
{"title":"Connecting People at a Conference: A Study of Influence between Offline and Online Using a Mobile Social Application","authors":"Xiang Zuo, Alvin Chin, Xiaoguang Fan, Bin Xu, Dezhi Hong, Y. Wang, Xia Wang","doi":"10.1109/GreenCom.2012.52","DOIUrl":"https://doi.org/10.1109/GreenCom.2012.52","url":null,"abstract":"Location-based mobile applications such as Foursquare and Jiepang help bridge the gap between offline and online. People that we encounter and connect with around physical resources such as conferences, provide opportunities for extending our social networks from offline to online. We give a preliminary study on the relationship between the online and physical social networks in terms of the online and offline interactions (O2O) established during the conference, using a mobile social proximity-based platform called Find & Connect. We propose metrics of overlap fraction, network scale, and O2O transfer amount to quantify the O2O behavior of conference attendees. Our results demonstrate that more than half of the online interactions are included in the offline interaction network, and the offline to online transfer holds the dominant position in this bidirectional O2O transition between online and offline interaction networks. To the best of our knowledge, this is the first work to study the influence of offline to online, and vice versa, in a restricted environment using a social proximity-based system.","PeriodicalId":148667,"journal":{"name":"2012 IEEE International Conference on Green Computing and Communications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126238627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Towards a Geocentric Mobile Syndication System 迈向以地球为中心的移动联合系统
2012 IEEE International Conference on Green Computing and Communications Pub Date : 2012-11-20 DOI: 10.1109/GreenCom.2012.17
A. Debrie, Pacôme Eberhart, Pierre-Louis Roman, Cécile Le Pape, O. Marin
{"title":"Towards a Geocentric Mobile Syndication System","authors":"A. Debrie, Pacôme Eberhart, Pierre-Louis Roman, Cécile Le Pape, O. Marin","doi":"10.1109/GreenCom.2012.17","DOIUrl":"https://doi.org/10.1109/GreenCom.2012.17","url":null,"abstract":"The present paper proposes a new approach towards filtering and processing the ever growing quantity of data published from mobile devices before it even reaches the Internet. We tackle this issue by circumscribing data to the zone where it is published (geocentricity) and allowing mobile device owners to republish the data they deem relevant (syndication). Results we obtained through simulation show that our solution enables to extract information that is relevant for a majority of users, whilst allowing less relevant data to be exchanged on more local scale before it disappears entirely.","PeriodicalId":148667,"journal":{"name":"2012 IEEE International Conference on Green Computing and Communications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121834164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtualization and Cognitive Management of Real World Objects in the Internet of Things 物联网中真实世界对象的虚拟化和认知管理
2012 IEEE International Conference on Green Computing and Communications Pub Date : 2012-11-20 DOI: 10.1109/GreenCom.2012.37
Dimitris Kelaidonis, A. Somov, V. Foteinos, George Poulios, V. Stavroulaki, P. Vlacheas, P. Demestichas, Alexander Baranov, A. Biswas, R. Giaffreda
{"title":"Virtualization and Cognitive Management of Real World Objects in the Internet of Things","authors":"Dimitris Kelaidonis, A. Somov, V. Foteinos, George Poulios, V. Stavroulaki, P. Vlacheas, P. Demestichas, Alexander Baranov, A. Biswas, R. Giaffreda","doi":"10.1109/GreenCom.2012.37","DOIUrl":"https://doi.org/10.1109/GreenCom.2012.37","url":null,"abstract":"This paper presents a framework for the virtualization of real world objects and the cognitive management of their virtual counterparts. The framework consists of three levels of functionality and each level comprises cognitive entities that provide the means for self-management and learning, allowing for smart, flexible applications and objects. The presented framework enables the abstraction of the heterogeneity that derives from the vast amount of diverse objects/devices, while enhancing reliability and facilitates the consideration of the views of various users/stakeholders (owners of objects & communication means) for ensuring proper application provision, business integrity and, therefore, maximization of exploitation opportunities. The paper also presents a corresponding prototype that has been developed for the validation of the proposed approach, in a real-life fire detection scenario in a Smart Home.","PeriodicalId":148667,"journal":{"name":"2012 IEEE International Conference on Green Computing and Communications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127301289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
On Data-Centric Intrusion Detection in Wireless Sensor Networks 无线传感器网络中以数据为中心的入侵检测研究
2012 IEEE International Conference on Green Computing and Communications Pub Date : 2012-11-20 DOI: 10.1109/GreenCom.2012.132
Michael Riecker, Ana Barroso, M. Hollick, Sebastian Biedermann
{"title":"On Data-Centric Intrusion Detection in Wireless Sensor Networks","authors":"Michael Riecker, Ana Barroso, M. Hollick, Sebastian Biedermann","doi":"10.1109/GreenCom.2012.132","DOIUrl":"https://doi.org/10.1109/GreenCom.2012.132","url":null,"abstract":"Wireless sensor networks (WSN) are increasingly used to support critical applications - especially in enterprise settings. If the sensor data collected through the network is incorrect, such applications cannot run reliably. Thus, detecting the occurrence of abnormal sensor values is crucial. In this paper we develop three decentralized, lightweight data anomaly detection mechanisms that can be run directly on sensor nodes. These algorithms are evaluated with a real dataset to which we added plausible attacks. Further, they are compared to standard centralized anomaly detection mechanisms.","PeriodicalId":148667,"journal":{"name":"2012 IEEE International Conference on Green Computing and Communications","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127574913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design Time Considerations for Cyber Physical Systems 网络物理系统的设计时间考虑
2012 IEEE International Conference on Green Computing and Communications Pub Date : 2012-11-20 DOI: 10.1109/GreenCom.2012.69
A. Usman, H. Mukhtar
{"title":"Design Time Considerations for Cyber Physical Systems","authors":"A. Usman, H. Mukhtar","doi":"10.1109/GreenCom.2012.69","DOIUrl":"https://doi.org/10.1109/GreenCom.2012.69","url":null,"abstract":"Cyber physical systems are complex systems which monitor, sense or interact with the environment, gather information with the help of different types of sensors or mobile devices, propagate the sensed data to a processing unit via WAN, LAN, MANET, VANET or overlay network, the processing unit process, analyze and store the received data, and based on the nature of the data or input send instructions to actuators to alter or try to alter the environment, or raise alarm, or send notifications to concerned devices or peoples already registered with the CPS for a particular type of event. Designing such a complex system is not an easy task and there are a number of important factors that should be taken care while designing these systems. A good number of studies have already focused on these requirements but for a particular type of cyber physical systems. In this work some of the general requirements are highlighted. These requirements are more of a MUST TO HAVE requirements rather than GOOD TO HAVE.","PeriodicalId":148667,"journal":{"name":"2012 IEEE International Conference on Green Computing and Communications","volume":"181 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113986860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multipurpose Use of Radiofrequency Sources for Probing Passive Wireless Sensors and Routing Digital Messages in a Wireless Sensor Network 在无线传感器网络中探测无源无线传感器和路由数字消息的射频源的多用途使用
2012 IEEE International Conference on Green Computing and Communications Pub Date : 2012-11-20 DOI: 10.1109/GreenCom.2012.109
G. Goavec-Mérou, K. Breshi, G. Martin, S. Ballandras, Julien Bernard, C. Droit, J. Friedt
{"title":"Multipurpose Use of Radiofrequency Sources for Probing Passive Wireless Sensors and Routing Digital Messages in a Wireless Sensor Network","authors":"G. Goavec-Mérou, K. Breshi, G. Martin, S. Ballandras, Julien Bernard, C. Droit, J. Friedt","doi":"10.1109/GreenCom.2012.109","DOIUrl":"https://doi.org/10.1109/GreenCom.2012.109","url":null,"abstract":"As the interest for sensor networks is growing, the demand for integrating both measurement algorithm and data transmission pushes to develop adapted electronic platforms to address this challenge. The use of radiofrequency (RF) passive surface acoustic wave sensors probed by radiomodem interfaces commonly found on wireless sensor node platforms is therefore investigated in this work. This approach allows for providing sensors with virtually infinite life expectancy since no local power source is needed on the sensing site. Rather than harvesting energy from the environment, the passive sensor is loaded by an incoming RF source provided by the same RF interface than the one used for digital communication of the gathered data. Implementing such a scheme in an adhoc wireless sensor network configuration is demonstrated using a novel platform based on the XE1203F radiomodem which provides the specific interfaces mandatory to such an application. Furthermore, a measurement demonstration locating the sensing element in an oven heated to 550°C emphasizes environmental conditions in which no energy storage or battery would withstand such harsh conditions, while the wireless interrogation between the interrogation unit (reader) and the sensor removes the need for high temperature-compatible connector and electrical cable. Implementing the sensor probing algorithm as well as the radiomodem control interface in the TinyOS executive environment then provides access to all the functionalities of this portable development tool, including multi-hop data routing and dynamic ad-hoc network construction, while complying with a clear software hierarchy ranging from low level drivers accessing the hardware to user applications implemented as tasks.","PeriodicalId":148667,"journal":{"name":"2012 IEEE International Conference on Green Computing and Communications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122890948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet 楼宇自动化协议中的隐蔽通道及其预防:以BACnet为例的原型
2012 IEEE International Conference on Green Computing and Communications Pub Date : 2012-11-20 DOI: 10.1109/GreenCom.2012.120
S. Wendzel, Benjamin Kahler, T. Rist
{"title":"Covert Channels and Their Prevention in Building Automation Protocols: A Prototype Exemplified Using BACnet","authors":"S. Wendzel, Benjamin Kahler, T. Rist","doi":"10.1109/GreenCom.2012.120","DOIUrl":"https://doi.org/10.1109/GreenCom.2012.120","url":null,"abstract":"Security in building automation systems (BAS) recently became a topic in the security community. BAS form a part of enterprise networks and can be utilized to gain access to a company network or to violate a security policy. Up to now, the threat of covert channels in BAS protocols was not discovered. While a first available solution can limit ``high level'' covert channels in BAS, there is no solution available to prevent covert channels on the lower level (i.e., in BAS protocols). In this paper, we present network covert storage and network covert timing channels in the network and application layer of the BACnet protocol stack to show that protocol-level covert channels in BAS are feasible. Additionally, we introduce the first means enabling a BAS to become multi-level secure on the network and application layer to prevent covert channels. We built a prototype based on the BACnet firewall router (BFR) to implement multi-level security in BACnet environments.","PeriodicalId":148667,"journal":{"name":"2012 IEEE International Conference on Green Computing and Communications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123982933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书